Flash vulnerability detection based on virtual execution and branch coverage

被引:0
|
作者
机构
[1] Peng, Cheng
[2] Duan, Guihua
[3] Wang, Xiangxin
[4] Dong, Pingping
[5] Guo, Kehua
来源
Duan, G. (duangh@csu.edu.cn) | 1600年 / Central South University of Technology卷 / 44期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Smart Contract Vulnerability Detection Based on Symbolic Execution Technology
    Liu, Yiping
    Xu, Jie
    Cui, Baojiang
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 193 - 207
  • [2] Patch-Related Vulnerability Detection Based on Symbolic Execution
    Qiang, Weizhong
    Liao, Yuehua
    Sun, Guozhong
    Yang, Laurence T.
    Zou, Deqing
    Jin, Hai
    IEEE ACCESS, 2017, 5 : 20777 - 20784
  • [3] Branch Sequence Coverage Criterion for Testing-Based Formal Verification with Symbolic Execution
    Wang, Rong
    Liu, Shaoying
    2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 205 - 212
  • [4] Constrained-Based Symbolic Execution on Virtual Models for Functional Coverage Verification
    Mohamed, Nahla Mohamed
    Safar, Mona
    Wahba, Ayman
    Salem, Ashraf
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 99 - 104
  • [5] Improving Guide-based Vulnerability Detection with Hybrid Symbolic Execution
    Ouyang, Yongji
    Zeng, Shuai
    Yang, Chao
    Wang, Qingxian
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 1038 - 1043
  • [6] GASE -An Input Domain Reduction and Branch Coverage System Based on Genetic Algorithm and Symbolic Execution
    Parthiban, M.
    Sumalatha, M. R.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 429 - 433
  • [7] Software Vulnerability Detection Based on Code Coverage and Test Cost
    Shuai, Bo
    Li, Haifeng
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 317 - 321
  • [8] Execution Path Classification for Vulnerability Analysis and Detection
    Stergiopoulos, George
    Katsaros, Panagiotis
    Gritzalis, Dimitris
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2015, 2016, 585 : 293 - 317
  • [9] Cache-Based Side-Channel Vulnerability Detection Based on Symbolic Execution
    Yang C.
    Guo Y.-F.
    Hu H.-C.
    Liu W.-Y.
    Huo S.-M.
    Wang Y.-W.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (06): : 1194 - 1200
  • [10] Compatible Branch Coverage Driven Symbolic Execution for Efficient Bug Finding
    Yi, Qiuping
    Yu, Yifan
    Yang, Guowei
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (PLDI):